# Nmap 7.60 scan initiated Thu Jan 14 16:59:36 2021 as: nmap --privileged -oA /data/scans/natlas.1a436096f035deeef2b6d3e95e5fb87c/nmap.1a436096f035deeef2b6d3e95e5fb87c --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 157.245.26.183 Nmap scan report for 157.245.26.183 Host is up (0.097s latency). Not shown: 1007 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 fe:58:f0:d3:93:10:73:6f:f2:d4:69:c4:63:db:44:6b (RSA) | 256 b7:db:52:c1:d7:33:a8:4c:07:b9:88:93:ed:f5:5a:3c (ECDSA) |_ 256 06:cd:45:b7:97:7f:ac:86:bb:7e:a7:9e:91:46:38:02 (EdDSA) Aggressive OS guesses: Linux 3.10 - 4.8 (97%), Linux 3.2 - 4.8 (96%), Linux 3.16 - 4.6 (95%), Linux 2.6.32 - 3.13 (95%), Linux 2.6.22 - 2.6.36 (93%), Linux 3.10 (93%), Linux 2.6.39 (93%), Linux 4.4 (92%), Linux 2.6.32 (92%), Linux 2.6.32 - 3.10 (91%) No exact OS matches for host (test conditions non-ideal). Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:59:47 2021 -- 1 IP address (1 host up) scanned in 10.86 seconds